International Journal of Science and Research (IJSR)
Computer Science
Downloads: 117 | Views: 549
Computer Science & Engineering, India, Volume 5 Issue 12, December 2016
Pages: 1675 - 1680Parameter Estimation and Validation Testing Procedures for Software Reliability Growth Model
Manohar Singh | Dr. Vaibhav Bansal
Downloads: 117 | Views: 487
Computer Science & Engineering, India, Volume 5 Issue 12, December 2016
Pages: 1782 - 1784Software Data Reduction Techniques for Effective Bug Triage
Rinku Ambadas Chaudhari | Sarika V. Bodake
Downloads: 117 | Views: 648
Computer Science & Engineering, India, Volume 5 Issue 12, December 2016
Pages: 1959 - 1961Smart City Prototype Design and Development of IOT-Enabled Applications
Khamruz Zama | Ramakrishna Prasad A L | Shiva Murthy G
Downloads: 117 | Views: 485
Computer Science & Engineering, India, Volume 6 Issue 2, February 2017
Pages: 1886 - 1889Deduplication Using SHA-1 and IBE with Modified AES
Renuka C. Deshpande | S. S. Ponde
Downloads: 117 | Views: 673
Computer Science & Engineering, India, Volume 6 Issue 2, February 2017
Pages: 1982 - 1984Comparison of Multi Document Summarization Techniques - A Survey
Heena Kishor Patil | Kumud Wasnik
Downloads: 117 | Views: 549
Computer Science & Engineering, India, Volume 6 Issue 2, February 2017
Pages: 2154 - 2157Social Recommendation for Interactive Online System
Thenmalar V | Tamilselvi R | Sandhiya S | Dhivya Shree M
Downloads: 117 | Views: 563
Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1657 - 1661A Comparative Surveyon Various Routing Protocols for Mobile Sink in WSN
Amit Kumar | Abhijeet Das
Downloads: 117 | Views: 523
Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 1707 - 1714Plant Disease Information Generating System Based On Android Application Technology
Jha Ashish K. | Bababe Adam B. | Dr. Ashok K. Sahoo
Downloads: 117 | Views: 443
Computer Science & Engineering, India, Volume 6 Issue 4, April 2017
Pages: 2189 - 2191Personalized Web Search Privacy Protection with Concealed User Requirement Specification
Devika P | Jitha K
Downloads: 117 | Views: 445
Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 1717 - 1722Vampire Attack Detection and Prevention to Defending WSN Based Application
Rajani Jagle | Dr. Abhay Kothari